The legalities of the digital signature
March 2019, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
Digitalisation and digital transformation have seen a significant organisational shift from paper-based processes and procedures. Most organisations have adopted alternative methodologies for signing documents to ensure auditable document trails while minimising the costs associated with paper-based transactions and the risks of fraud and identity theft. However, few recognise the difference between an electronic signature and a digital signature – a critical difference that can have an impact on the legalities and security of any document trail.
“The electronic signature is usually defined as an identifying mark that can be anything from a photograph or a scan of a signature to a squiggle made on a mobile phone or tablet,” explains Adv Rian Schoeman, head of Legal, LAWtrust, an Etion company. “It isn’t secure. In fact, the electronic signature is at risk of fraud as it is easy to copy, move and adjust. This is particularly true of poorly executed signatures that are not easily identifiable.”
To ensure deeper security, particularly with regards to highly sensitive or complex records and contracts, digital signatures are more efficient and reliable. A digital signature ensures an auditable, provable trail that can be clearly linked to a specific person and identity. Usually, a digital signature can only be used once the individual has undergone a process of identity verification which assures all parties that the right person has signed the right documentation.
“When you open a digitally signed document with a solution such as Adobe PDF reader, selecting the signature will reveal the digital certificate that outlines the individuals name, surname, and other specified identifying factors such as an email address,” says Schoeman. “These signatures are certified and legally binding.”
An electronic signature, paper-based signature, photograph or email signature may have legal weight, but proving that the person’s intention was to be bound by that signature is an involved, complex process. A digital signature does not face the same challenge. The identify verification process ensures that much of this evidence is built into the signature. While the legal process will require that the organisation prove who made the signature, in the event of a query, the process is simplified by the digital trail and embedded forensic evidence.
“To be completely assured of digital signature security, South Africa’s Electronic Communications and Transactions Act (ECTA) recognises the concept of an Advanced Electronic Signature (AES),” adds Schoeman. “This is similar to a digital signature in that it is based on a digital certificate, but it requires face-to-face verification. This ensures the person receiving the document that the signer (signatory) of the document has been verified in person.”
When a signature is disputed, it is the person who queries the signature who has to prove that it is invalid. For large organisations that enter into numerous contract agreements, this is a valuable tool as it assures them of a measure of security when signing agreements.
“To provide both enterprise and its legal department with peace of mind, it is recommended that all digital contracts or agreements are signed using a digital signature,” concludes Schoeman. “This will not only alleviate unnecessary issues that could occur further down the line but will provide all parties with the right levels of assurance from the outset.”
For more information go to http://www.etion.co.za/
- 2019 Internet of Things (IoT) Barometer
March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
- Ideal operating temperature?
March 2019, Leaderware, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
Walk into any CCTV control room in South Africa, whether in the middle of a heat wave or mid-winter, and you will probably see a number of operators wearing jackets, some huddled over slightly in an attempt to get warm.
- Halt, who goes there?
March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.
- Using security to enhance the customer experience?
March 2019, Axis Communications SA, Fidelity ADT Security, ISDS, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Security Services & Risk Management, Retail (Industry)
Customer experience will overtake price and product as the key retail brand differentiator by the year 2020. Will the security industry be part of this transformation?
- Intelligent video transforms the in-store experience
March 2019, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
The customer experience is more important than ever as retailers are striving to differentiate themselves in a challenging and crowded market.
- Where guards and technology meet
March 2019, Fidelity Security Group, Xone Integrated Security, Security Services & Risk Management
Many of the smart technologies coming to market aim to eliminate or at least manage the human element, but in South Africa in particular, manned guards are still ubiquitous.
- Two-way radio is alive and well
March 2019, Global Communications (Member of Hudaco Group), Security Services & Risk Management
Digital technology has given two-way radios a new lease on life by offering significant advantages over analogue technology.
- Enabling smarter cash handling solutions
March 2019, Technews Publishing, Cash Connect, This Week's Editor's Pick, Asset Management, EAS, RFID
Modern retail cash management has evolved so far from the old ‘dumb’ safe that it has become an essential enabler of today’s business.
- IoT is convergence in action
March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.
- Stop hacking of access control systems
March 2019, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.
- Changing the security landscape
March 2019, Technews Publishing, This Week's Editor's Pick, News, Security Services & Risk Management
Using smart technology and an intelligent platform, Aura has a vision to reduce crime in South Africa by 50% by 2025.
- New cybersecurity pavilion for Securex 2019
March 2019, Securex South Africa , This Week's Editor's Pick, Cyber Security, News, Conferences & Events, Training & Education
Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...